On the security model of software wallets

On the security model of software wallets

Published by this siteWe can distinguish two prevalent types of wallets: software and hardware wallets. They fulfill the same function, but in a different way. Software wallets are considered simpler to use: a single program is enough to create, validate and sign...
On the security model of software wallets

Protecting SSH keys with TPM 2.0, now available on Debian

Published by this siteIn this protocol, users are required to be authenticated. They can do this with passwords, files containing private RSA keys, hardware devices such as Ledger Nano S and Ledger Nano X, etc. Some authentication means are more secure than others:...
On the security model of software wallets

Remote laser faults injection during pandemic

Published by this siteThis short post describes some laser station enhancements we made to be able to run our experiments remotely. Setup problems Our laser fault injection platform is made of a microscope used to focus a laser source down to a device under test. It...
On the security model of software wallets

On the security of Booba’s music video and NFTs

Published by this siteThe 3rd of November 2021, Booba (the french rapper who created the label La Piraterie Music) put a set of 5 NFTs up for sale, for a total of 5000 of each of these animated cards. The totality of these NFTs were sold in a few days for 150 ETH...